Sciweavers

2421 search results - page 301 / 485
» Message from the Co-Chairs
Sort
View
IJHPCA
2010
117views more  IJHPCA 2010»
13 years 9 months ago
Fine-Grained Multithreading Support for Hybrid Threaded MPI Programming
As high-end computing systems continue to grow in scale, recent advances in multiand many-core architectures have pushed such growth toward more denser architectures, that is, mor...
Pavan Balaji, Darius Buntinas, David Goodell, Will...
JCS
2010
135views more  JCS 2010»
13 years 9 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 8 months ago
An In-depth Analysis of Spam and Spammers
Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant in...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
KIVS
2011
Springer
13 years 1 months ago
A Feasibility Check for Geographical Cluster Based Routing under Inaccurate Node Localization in Wireless Sensor Networks
Localized geographic single path routing along a wireless network graph requires exact location information about the network nodes to assure message delivery guarantees. Node loc...
Hannes Frey, Ranjith Pillay
IACR
2011
89views more  IACR 2011»
12 years 10 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown